Microsoft Outlook Critical Vulnerability

CVE Category Price Severity
CVE-2021-31166 CWE-119 $10,000 Critical
Author Risk Exploitation Type Date
Unknown Critical Remote 2006-01-21
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at:

Below is a copy:

John Heasman and Mark Litchfield of NGSSoftware have discovered a critical 
affecting Microsoft Outlook.  The vulnerable versions include:

Microsoft Outlook 2000 (inc. Microsoft Office 2000 Service Pack 3 and 
Multilanguage packs)
Microsoft Outlook 2002 (inc. Microsoft Office XP Service Pack 3 and 
Multilingual UI packs)
Microsoft Outlook 2003 (inc. Microsoft Office 2003 Service Pack 1, Service 
Pack 2 and
Multilingual UI packs)

The vulnerability potentially allows execution of arbitrary code when the 
user previews
or opens a specially crafted email message.

The flaw has now been addressed and patches are available from:

NGSSoftware are going to withhold details of this flaw for three months. 
Full details will
be published on the 10th April 2006.  This three month window will allow 
administrators the time needed to obtain the patch before the details are 
released to the
general public.  This reflects NGSSoftware's approach to responsible 

NGSSoftware Insight Security Research
+44(0)208 401 0070

Mark Litchfield
Tel: +44 208 40 100 70
Fax: +44 208 40 100 76
Cell: +1 253 414 4749


The information contained in this email and any subsequent correspondence is 
private, is solely for the intended recipient(s) and may contain 
confidential or privileged information. For those other than the intended 
recipient(s), any disclosure, copying, distribution, or any other action 
taken, or omitted to be taken, in reliance on such information is prohibited 
and may be unlawful. If you are not the intended recipient and have received 
this message in error, please inform the sender and delete this mail and any 

The views expressed in this email do not necessarily reflect NGS policy. NGS 
accepts no liability or responsibility for any onward transmission or use of 
emails and attachments having left the NGS domain.

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum